Evgenia Novikova

Orcid: 0000-0003-2923-4954

According to our database1, Evgenia Novikova authored at least 41 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security.
SN Comput. Sci., April, 2024

2023
Cyber Attacker Profiling for Risk Analysis Based on Machine Learning.
Sensors, February, 2023

Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation.
Algorithms, February, 2023

An Analytical Review of the Source Code Models for Exploit Analysis.
Inf., 2023

Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

2022
Analysis of Privacy-Enhancing Technologies in Open-Source Federated Learning Frameworks for Driver Activity Recognition.
Sensors, 2022

Privacy Policies of IoT Devices: Collection and Analysis.
Sensors, 2022

Image-Based Approach to Intrusion Detection in Cyber-Physical Objects.
Inf., 2022

Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case.
Algorithms, 2022

Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges.
Algorithms, 2022

An approach to formal desription of the user notification scenarios in privacy policies.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

Image-Based Intrusion Detection in Network Traffic.
Proceedings of the Intelligent Distributed Computing XV, 2022

Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract).
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Open-Source Federated Learning Frameworks for IoT: A Comparative Review and Analysis.
Sensors, 2021

Combined Approach to Anomaly Detection in Wireless Sensor Networks on Example of Water Management System.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

Towards application of text mining techniques to the analysis of the privacy policies.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

Approach to Anomaly Detection in Cyber-Physical Object Behavior.
Proceedings of the Intelligent Distributed Computing XIV, 2021

CPE and CVE based Technique for Software Security Risk Assessment.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Security Measuring System for IoT Devices.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects.
Inf., 2020

Explaining Android Application Authorship Attribution Based on Source Code Analysis.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Data Mining Algorithms Parallelization in the Framework of Agent-Oriented Programming.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Exploration of the Anomalies in HVAC Data Using Image Similarity Assessment.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

P2Onto: Making Privacy Policies Transparent.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Towards Attacker Attribution for Risk Analysis.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
The Location-Centric Approach to Employee's Interaction Pattern Detection.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

An Approach to the Analysis of the Vehicle Movement on the Organization Territory.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

The Visualization-Driven Approach to the Analysis of the HVAC Data.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization.
Secur. Commun. Networks, 2018

2017
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure.
Proceedings of the Computer Network Security, 2017

2016
DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2016

2014
Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services.
Int. J. Mob. Comput. Multim. Commun., 2014

Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Visualization of Security Metrics for Cyber Situation Awareness.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Analytical Visualization Techniques for Security Information and Event Management.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013

Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013

Dynamical Attack Simulation for Security Information and Event Management.
Proceedings of the Information Fusion and Geographic Information Systems, 2013

VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Attack Modelling and Security Evaluation for Security Information and Event Management.
Proceedings of the SECRYPT 2012, 2012

Blind 384-bit Digital Signature Scheme.
Proceedings of the Computer Network Security, 2012


  Loading...